HomeCyber SecurityEssential Versa Concerto Flaws Let Attackers Escape Docker and Compromise Hosts

Essential Versa Concerto Flaws Let Attackers Escape Docker and Compromise Hosts


Might 22, 2025Ravie LakshmananVulnerability / Software program Safety

Essential Versa Concerto Flaws Let Attackers Escape Docker and Compromise Hosts

Cybersecurity researchers have uncovered a number of vital safety vulnerabilities impacting the Versa Concerto community safety and SD-WAN orchestration platform that could possibly be exploited to take management of vulnerable cases.

It is price noting that the recognized shortcomings stay unpatched regardless of accountable disclosure on February 13, 2025, prompting a public launch of the problems following the top of the 90-day deadline.

“These vulnerabilities, when chained collectively, might enable an attacker to completely compromise each the appliance and the underlying host system,” ProjectDiscovery researchers Harsh Jaiswal, Rahul Maini, and Parth Malhotra stated in a report shared with The Hacker Information.

Cybersecurity

The safety defects are listed under –

  • CVE-2025-34025 (CVSS rating: 8.6) – A privilege escalation and Docker container escape vulnerability that is brought on by unsafe default mounting of host binary paths and could possibly be exploited to achieve code execution on the underlying host machine
  • CVE-2025-34026 (CVSS rating: 9.2) – An authentication bypass vulnerability within the Traefik reverse proxy configuration that enables an attacker to entry administrative endpoints, which might then be exploited to entry heap dumps and hint logs by exploiting an inner Spring Boot Actuator endpoint through CVE-2024-45410
  • CVE-2025-34027 (CVSS rating: 10.0) – An authentication bypass vulnerability within the Traefik reverse proxy configuration that enables an attacker to entry administrative endpoints, which might then be exploited to realize distant code execution by exploiting an endpoint associated to package deal uploads (“/portalapi/v1/package deal/spack/add”) through arbitrary file writes

Profitable exploitation of CVE-2025-34027 might enable an attacker to leverage a race situation and write malicious recordsdata to disk, in the end leading to distant code execution utilizing LD_PRELOAD and a reverse shell.

“Our strategy concerned overwriting ../../../../../../and so on/ld.so.preload with a path pointing to /tmp/hook.so,” the researchers stated. “Concurrently, we uploaded /tmp/hook.so, which contained a compiled C binary for a reverse shell. Since our request triggered two file write operations, we leveraged this to make sure that each recordsdata have been written inside the similar request.”

“As soon as these recordsdata have been efficiently written, any command execution on the system whereas each persevered would outcome within the execution of /tmp/hook.so, thereby giving us a reverse shell.”

Within the absence of an official repair, customers are suggested to dam semicolons in URL paths and drop requests the place the Connection header comprises the worth X-Actual-Ip. It is also really useful to observe community site visitors and logs for any suspicious exercise.

Replace

Versa Networks, in an announcement shared with The Hacker Information, stated the problems have been addressed in Concerto model 12.2.1 GA launched on April 16, 2025. The entire response from the corporate is under –

Versa is dedicated to sustaining the best requirements of safety and transparency throughout our platform.

On February 13, 2025, three vulnerabilities have been recognized and confirmed in our Concerto software program platform. As a part of our normal safety response course of, we developed and validated fixes, which have been accomplished on March 7, 2025, and the hotfix made accessible to clients. A Typically Obtainable (GA) software program launch containing these remediations was made accessible to all clients on April 16, 2025.

Many shoppers have already upgraded to the April sixteenth launch, although we acknowledge some deployments should be pending. Detailed data on affected releases and mitigation steps has been posted for buyer entry solely.

There isn’t a indication that these vulnerabilities have been exploited within the wild, and no buyer affect has been reported. All affected clients have been notified by established safety and assist channels with steering on the right way to apply the really useful updates.

Versa follows accountable disclosure practices and takes a proactive strategy to figuring out, mitigating, and speaking potential dangers. Safety is foundational to our platform, and we proceed to spend money on steady monitoring, fast response, and buyer training as a part of our dedication to belief and safety.

(The story was up to date after publication to incorporate a response from Versa Networks in regards to the patch data.)

Discovered this text fascinating? Comply with us on Twitter and LinkedIn to learn extra unique content material we submit.



RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments